Resources

Organizations like ESET North America receive over 100,000 threat samples every day. How is one supposed to stay ahead of the game and protect themselves and their organizations? The resources listed below are just a few things that you can learn about and become more protected both at work and home.

Documents

These documents are for informational purposes. This section is designed to provide information, tips and general awareness and education for you, as a business, individual and family on how to improve your cyber security.

Templates & Checklists

Cyber security is hard. We want to make things as easy as possible for small and medium sized business to help do their part in promoting cyber security in the office, for their staff and for their customers. We have built templates and tools to help guide you through just some of the basics that are needed to help keep your business safer. Many of Securing Our eCity sponsors and partners offer solutions that can assist further. Visit our Donor and Sponsor page to learn more.

Games & Activities

Learning about Cyber security and some of the best practices to stay safer online can be fun for the whole family or even your colleagues at work! The Securing Our eCity Foundation has developed specialized games and activities to accompany our Cyber security Foundational Workshops. For a sample, you can download our Cyber Word Search.

Become a cyber investigator while you play our Agent Surefire! You will search around a virtual office to see what trails staff have left for cyber criminals as you help protect “The Office!”

Have fun and learn about staying safer online! To engage with us for our game of CyberFeud, send a request to info@securingourecity.org.

Cyber Word Search: For all ages, find the cyber security words embedded in the puzzle

Agent Surefire: Breach Buster is an engaging cyber security adventure game for ages 13 and up. It is set in an office where a security breach has occurred and Agent Surefire has been engaged by the management to uncover the perpetrator. Along the way, in communicating with “The Central,” the agent finds out that the perpetrator just left the office and may be working with a notorious hacker on the outside named Cyrus.